Sciweavers

3516 search results - page 321 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
IJNSEC
2008
112views more  IJNSEC 2008»
15 years 4 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
DATE
2005
IEEE
278views Hardware» more  DATE 2005»
15 years 9 months ago
Virtual Hardware Prototyping through Timed Hardware-Software Co-Simulation
Designers of factory automation applications increasingly demand for tools for rapid prototyping of hardware extensions to existing systems and verification of resulting behavior...
Franco Fummi, Mirko Loghi, Stefano Martini, Marco ...
WSE
2002
IEEE
15 years 9 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
CSFW
2011
IEEE
14 years 4 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
ACSAC
2006
IEEE
15 years 10 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu